First published: Tue Apr 25 2023(Updated: )
Zyxel ATP, USG FLEX, VPN, and ZyWALL/USG firewalls allow for improper error message handling which could allow an unauthenticated attacker to execute OS commands remotely by sending crafted packets to an affected device.
Credit: security@zyxel.com.tw security@zyxel.com.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Zyxel firewall | ||
Zyxel Multiple Firewalls | ||
Zyxel ATP100 Firmware | >=4.60<5.36 | |
Zyxel ATP100 Firmware | ||
Zyxel ATP100W Firmware | >=4.60<5.35 | |
Zyxel ATP100W Firmware | ||
Zyxel ATP200 firmware | >=4.60<5.36 | |
Zyxel ATP200 firmware | ||
Zyxel ATP500 Firmware | >=4.60<5.36 | |
Zyxel ATP500 Firmware | ||
Zyxel ATP700 Firmware | >=4.60<5.36 | |
Zyxel ATP700 Firmware | ||
Zyxel ATP800 | >=4.60<5.36 | |
Zyxel ATP800 Firmware | ||
Zyxel USG Flex 100 firmware | >=4.60<5.36 | |
Zyxel USG FLEX 100 | ||
Zyxel USG FLEX 100w firmware | >=4.60<5.36 | |
Zyxel USG FLEX 100w firmware | ||
Zyxel USG FLEX 200 | >=4.60<5.36 | |
Zyxel USG FLEX 200 firmware | ||
Zyxel USG FLEX 50(W) series firmware | >=4.60<5.36 | |
Zyxel USG FLEX 50 | ||
Zyxel USG FLEX 500 | >=4.60<5.36 | |
Zyxel USG FLEX 500 firmware | ||
Zyxel USG FLEX 50w | >=4.60<5.36 | |
Zyxel USG FLEX 50(W) series firmware | ||
Zyxel USG FLEX 700 firmware | >=4.60<5.36 | |
Zyxel USG FLEX 700 firmware | ||
Zyxel VPN100 | >=4.60<5.36 | |
Zyxel VPN100 Firmware | ||
Zyxel VPN1000 Firmware | >=4.60<5.36 | |
Zyxel VPN1000 Firmware | ||
Zyxel Zywall VPN 300 Firmware | >=4.60<5.36 | |
Zyxel VPN300 | ||
Zyxel Zywall VPN 50 Firmware | >=4.60<5.36 | |
Zyxel VPN50 Firmware | ||
Zyxel ZyWALL USG 310 firmware | >=4.60<4.73 | |
Zyxel ZyWALL USG 310 firmware | =4.73 | |
Zyxel ZyWALL USG 310 | ||
Zyxel ZyWALL USG 100 | >=4.60<4.73 | |
Zyxel ZyWALL USG 100 | =4.73 | |
Zyxel ZyWALL USG 100 firmware | ||
All of | ||
Zyxel ATP100 Firmware | >=4.60<5.36 | |
Zyxel ATP100 Firmware | ||
All of | ||
Zyxel ATP100W Firmware | >=4.60<5.35 | |
Zyxel ATP100W Firmware | ||
All of | ||
Zyxel ATP200 firmware | >=4.60<5.36 | |
Zyxel ATP200 firmware | ||
All of | ||
Zyxel ATP500 Firmware | >=4.60<5.36 | |
Zyxel ATP500 Firmware | ||
All of | ||
Zyxel ATP700 Firmware | >=4.60<5.36 | |
Zyxel ATP700 Firmware | ||
All of | ||
Zyxel ATP800 | >=4.60<5.36 | |
Zyxel ATP800 Firmware | ||
All of | ||
Zyxel USG Flex 100 firmware | >=4.60<5.36 | |
Zyxel USG FLEX 100 | ||
All of | ||
Zyxel USG FLEX 100w firmware | >=4.60<5.36 | |
Zyxel USG FLEX 100w firmware | ||
All of | ||
Zyxel USG FLEX 200 | >=4.60<5.36 | |
Zyxel USG FLEX 200 firmware | ||
All of | ||
Zyxel USG FLEX 50(W) series firmware | >=4.60<5.36 | |
Zyxel USG FLEX 50 | ||
All of | ||
Zyxel USG FLEX 500 | >=4.60<5.36 | |
Zyxel USG FLEX 500 firmware | ||
All of | ||
Zyxel USG FLEX 50w | >=4.60<5.36 | |
Zyxel USG FLEX 50(W) series firmware | ||
All of | ||
Zyxel USG FLEX 700 firmware | >=4.60<5.36 | |
Zyxel USG FLEX 700 firmware | ||
All of | ||
Zyxel VPN100 | >=4.60<5.36 | |
Zyxel VPN100 Firmware | ||
All of | ||
Zyxel VPN1000 Firmware | >=4.60<5.36 | |
Zyxel VPN1000 Firmware | ||
All of | ||
Zyxel Zywall VPN 300 Firmware | >=4.60<5.36 | |
Zyxel VPN300 | ||
All of | ||
Zyxel Zywall VPN 50 Firmware | >=4.60<5.36 | |
Zyxel VPN50 Firmware | ||
All of | ||
Any of | ||
Zyxel ZyWALL USG 310 firmware | >=4.60<4.73 | |
Zyxel ZyWALL USG 310 firmware | =4.73 | |
Zyxel ZyWALL USG 310 | ||
All of | ||
Any of | ||
Zyxel ZyWALL USG 100 | >=4.60<4.73 | |
Zyxel ZyWALL USG 100 | =4.73 | |
Zyxel ZyWALL USG 100 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28771 is a vulnerability that allows an unauthenticated attacker to execute OS commands remotely on Zyxel ATP, USG FLEX, VPN, and ZyWALL/USG firewalls.
An attacker can exploit CVE-2023-28771 by sending crafted packets to the affected Zyxel firewall devices.
Zyxel ATP, USG FLEX, VPN, and ZyWALL/USG firewalls are affected by CVE-2023-28771.
CVE-2023-28771 is a critical vulnerability that allows remote code execution on affected Zyxel firewall devices.
Yes, Zyxel has released a security advisory with mitigation measures for CVE-2023-28771.